cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,244Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β556Updated this week
- π A curated list of awesome Docker security resourcesβ690Updated 4 months ago
- β573Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,161Updated 3 weeks ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,153Updated last year
- Automating situational awareness for cloud penetration tests.β2,229Updated this week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,045Updated last week
- Granular, Actionable Adversary Emulation for the Cloudβ2,179Updated last month
- My cheatsheet notes to pentest AWS infrastructureβ691Updated 3 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ815Updated 7 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,013Updated 10 months ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requeβ¦β1,456Updated last year
- A curated list of awesome CI CD security resourcesβ652Updated 3 weeks ago
- π¦π Awesome list of secrets in environment variables π₯οΈβ898Updated 3 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ489Updated 2 years ago
- Checklist for container security - devsecops practicesβ1,598Updated last month
- A Blazing fast Security Auditing tool for Kubernetesβ1,006Updated last year
- NMAP Vulnerability Scanning Scriptsβ628Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,122Updated 6 months ago
- A DFIR tool written in Python.β1,053Updated 4 years ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,302Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,466Updated 3 years ago
- A curated list of awesome Kubernetes security resourcesβ948Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,730Updated 2 years ago
- Detector for Log4Shell exploitation attemptsβ729Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,195Updated 5 months ago
- Automated Red Team Infrastructure deployement using Dockerβ1,253Updated 3 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,302Updated 9 months ago
- Simple local scanner for vulnerable log4j instancesβ374Updated 3 years ago
- Real-time HTTP Intrusion Detectionβ3,071Updated last year